CVE-2024-21338

Windows Kernel Elevation of Privilege Vulnerability

Basic Information

CVE State
PUBLISHED
Reserved Date
December 08, 2023
Published Date
February 13, 2024
Last Updated
April 24, 2025
Vendor
Microsoft
Product
Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation)
Description
Windows Kernel Elevation of Privilege Vulnerability

CVSS Scores

CVSS v3.1

7.8 - HIGH

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

SSVC Information

Exploitation
Active
Technical Impact
Total

Exploit Status

Exploited in the Wild
Yes (added 2024-03-04 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-05-18 15:38:34 UTC) Source
Used in Malware
Yes (added 2024-03-04 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2024-03-04 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Crowdfense/CVE-2024-21338

Type: github • Created: 2024-07-29 13:18:06 UTC • Stars: 55

Windows AppLocker Driver (appid.sys) LPE

tykawaii98/CVE-2024-21338_PoC

Type: github • Created: 2024-06-23 06:03:44 UTC • Stars: 39

Zombie-Kaiser/CVE-2024-21338-x64-build-

Type: github • Created: 2024-05-18 15:38:34 UTC • Stars: 7

Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.

varwara/CVE-2024-21338

Type: github • Created: 2024-04-23 19:09:22 UTC • Stars: 16

PoC for the Untrusted Pointer Dereference in the appid.sys driver

hakaioffsec/CVE-2024-21338

Type: github • Created: 2024-04-13 05:53:02 UTC • Stars: 292

Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.